Node Removal in Criminal Networks
暂无分享,去创建一个
Uffe Kock Wiil | Rasmus Rosenqvist Petersen | Christopher J. Rhodes | C. J. Rhodes | U. Wiil | R. Petersen
[1] Uffe Kock Wiil,et al. Hypertext structures for investigative teams , 2011, HT '11.
[2] Christopher J. Rhodes,et al. The Use of Open Source Intelligence in the Construction of Covert Social Networks , 2011, Counterterrorism and Open Source Intelligence.
[3] P. Jones,et al. Inferring missing links in partially observed social networks , 2009, J. Oper. Res. Soc..
[4] Robert M. Clark,et al. Intelligence Analysis: A Target-Centric Approach , 2003 .
[5] C. J. Rhodes,et al. Social network topology: a Bayesian approach , 2007, J. Oper. Res. Soc..
[6] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[7] Uffe Kock Wiil,et al. Knowledge Management Tools for Terrorist Network Analysis , 2010, IC3K.
[8] Andreas Tolk,et al. NATO Code of Best Practice for C2 Assessment - Implications for SISO , 2002 .
[9] Edward A. Smith. Complexity, Networking, & Effects-Based Approaches to Operations , 2006 .
[10] Nasrullah Memon,et al. Notice of Violation of IEEE Publication PrinciplesPractical approaches for analysis, visualization and destabilizing terrorist networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[11] Uffe Kock Wiil,et al. CrimeFighter: A Toolbox for Counterterrorism , 2009, IC3K.
[12] Hani Hanjour,et al. Destabilizing Dynamic Covert Networks , 2003 .
[13] Destabilizing networks , 2002 .